CrossC2 Expanding Cobalt Strike Beacon to CrossPlatform Attacks

From September to December 2024, incidents involving CrossC2, an extension tool for Cobalt Strike Beacon on Linux, were confirmed. The attacker used CrossC2 along with other tools like PsExec, Plink, and Cobalt Strike to penetrate AD. A custom malware called ReadNimeLoader was used as a loader for Cobalt Strike. The campaign may have affected multiple countries. CrossC2 is an unofficial Beacon and builder compatible with Cobalt Strike 4.1+, designed for Linux and macOS. It contains anti-analysis features and encrypted configuration data. The attack flow involved java.exe, ReadNimeLoader, and OdinLdr to execute Cobalt Strike Beacon. Other tools used include SystemBC, GetNPUsers, and privilege escalation tools. The campaign shows potential connections to BlackBasta based on similar characteristics. Author: AlienVault

Related Tags:
ad

ReadNimeLoader

CrossC2

T1080

T1027.001

T1497.001

Cobalt Strike – S0154

T1003.008

T1027.002

Associated Indicators:
99D6B73B1A9E66D7F6DCB3244EA0783B60776EFD223D95C4F95E31FDE434E258

9E8C550545AEA5212C687E15399344DF8A2C89F8359B90D8054F233A757346E7

6246FB5C8B714707AC49ADE53E6FE5017D96442DB393B1C0BA964698AE24245D

E0E827198A70EEF6C697559660106CFAB7229483B0CD7F0C7ABD384A3D2EE504

28D668F3E1026A56D55BC5D6E36FAD71622C1AB20ACE52D3AB12738F9F8C6589

F79E047AE4834E6A9234CA1635F18B074A870B366FE4368C10C2DDC56DFBB1BC

0AB709728666F8759AD8DB574D4009CF74EBCE36EF2572EF52B058997A9B2A25

AC02AEE660D44A8BFBC69E9C46CF402FD41E99915E13D0DE3977E662EF13B2CA

AD90A4490D82C7BD300FDBBDCA0336E5AD2219D63EA0F08CEBC33050D65B7EF2